Jason Nurse : Publications
-
[1]
A Capability−oriented Approach to Assessing Privacy Risk in Smart Home Ecosystems
Jack Sturgess‚ Jason R C Nurse and Jun Zhao
In Living in the Internet of Things: Cybersecurity of the IoT Conference. IET. 2018.
Details about A Capability−oriented Approach to Assessing Privacy Risk in Smart Home Ecosystems | BibTeX data for A Capability−oriented Approach to Assessing Privacy Risk in Smart Home Ecosystems | Download (pdf) of A Capability−oriented Approach to Assessing Privacy Risk in Smart Home Ecosystems | DOI (10.1049/cp.2018.0037)
-
[2]
A Case Study Analysis of an E−Business Security Negotiations Support Tool
Jason R.C. Nurse and Jane E. Sinclair
In Electrical Engineering and Applied Computing. Vol. 90 of Lecture Notes in Electrical Engineering. Springer. 2011.
Details about A Case Study Analysis of an E−Business Security Negotiations Support Tool | BibTeX data for A Case Study Analysis of an E−Business Security Negotiations Support Tool | DOI (10.1007/978-94-007-1192-1_18)
-
[3]
A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks
Sadie Creese‚ Michael Goldsmith‚ Jason R.C. Nurse and Elizabeth Phillips
In 11th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−12). Pages 1124−1131. IEEE. 2012.
Details about A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | BibTeX data for A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | Download (pdf) of A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | DOI (10.1109/TrustCom.2012.22)
-
[4]
A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring
Louise Axon; Jason R. C. Nurse; Michael Goldsmith; Sadie Creese
In International Journal On Advances in Security. 2017.
Details about A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring | BibTeX data for A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring | Download (pdf) of A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring
-
[5]
A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models
Tabish Rashid‚ Ioannis Agrafiotis and Jason R.C. Nurse
In 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST). ACM. 2016.
Details about A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models | BibTeX data for A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models | Download (pdf) of A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models | DOI (10.1145/2995959.2995964)
-
[6]
A Pragmatic System−failure Assessment and Response Model
Jassim Happa‚ Graham Fairclough‚ Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith and Sadie Creese
In 2nd International Conference on Information Systems Security and Privacy. 2016.
Details about A Pragmatic System−failure Assessment and Response Model | BibTeX data for A Pragmatic System−failure Assessment and Response Model | Download (pdf) of A Pragmatic System−failure Assessment and Response Model | DOI (10.5220/0005795105030508)
-
[7]
A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E−Business Collaborations
Jason R.C. Nurse and Jane E. Sinclair
In 5th International Conference on Internet and Web Applications and Services (ICIW 2010). IEEE. 2010.
Details about A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E−Business Collaborations | BibTeX data for A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E−Business Collaborations | DOI (10.1109/ICIW.2010.10)
-
[8]
A Thorough Evaluation of the Compatibility of an E−Business Security Negotiations Support Tool
Jason R.C. Nurse and Jane E. Sinclair
In International Journal of Computer Science. Vol. 37. No. 4. 2010.
Details about A Thorough Evaluation of the Compatibility of an E−Business Security Negotiations Support Tool | BibTeX data for A Thorough Evaluation of the Compatibility of an E−Business Security Negotiations Support Tool | Download (pdf) of A Thorough Evaluation of the Compatibility of an E−Business Security Negotiations Support Tool
-
[9]
A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches
Jason R.C. Nurse‚ Philip A. Legg‚ Oliver Buckley‚ Ioannis Agrafiotis‚ Gordon Wright‚ Monica Whitty‚ David Upton‚ Michael Goldsmith and Sadie Creese
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 16th International Conference on Human−Computer Interaction (HCI). Springer. 2014.
Details about A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | BibTeX data for A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | Download (pdf) of A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | DOI (10.1007/978-3-319-07620-1_24)
-
[10]
A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK
Elmarie Kritzinger‚ Maria Bada and Jason R.C. Nurse
In IFIP World Conference on Information Security Education. Pages 110−120. Springer. 2017.
Details about A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK | BibTeX data for A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK | Download (pdf) of A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK | DOI (10.1007/978-3-319-58553-6_10)
-
[11]
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System
Jason R.C. Nurse; Ioannis Agrafiotis; Arnau Erola; Maria Bada; Taylor Roberts; Meredydd Williams; Michael Goldsmith; Sadie Creese
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 19th International Conference on Human−Computer Interaction (HCII). Springer. 2017.
Details about An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System | BibTeX data for An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System | Download (pdf) of An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System | DOI (10.1007/978-3-319-58460-7_26)
-
[12]
An Ethics Framework for Research into Heterogeneous Systems
Jassim Happa‚ Jason R C Nurse‚ Michael Goldsmith‚ Sadie Creese and Rebecca Williams
In Living in the Internet of Things: Cybersecurity of the IoT Conference. IET. 2018.
To appear
Details about An Ethics Framework for Research into Heterogeneous Systems | BibTeX data for An Ethics Framework for Research into Heterogeneous Systems
-
[13]
An Evaluation of BOF4WSS and the Security Negotiations Model and Tool used to Support it
Jason R.C. Nurse and Jane E. Sinclair
In International Journal On Advances in Security. Vol. 3. No. 3&4. 2010.
Details about An Evaluation of BOF4WSS and the Security Negotiations Model and Tool used to Support it | BibTeX data for An Evaluation of BOF4WSS and the Security Negotiations Model and Tool used to Support it | Download (pdf) of An Evaluation of BOF4WSS and the Security Negotiations Model and Tool used to Support it
-
[14]
An Independent Assessment of the Procedural Components of the Estonian Internet Voting System
Jason R.C. Nurse; Ioannis Agrafiotis; Arnau Erola; Maria Bada; Taylor Roberts; Meredydd Williams; Michael Goldsmith; Sadie Creese
No. WP−6. September, 2016.
Details about An Independent Assessment of the Procedural Components of the Estonian Internet Voting System | BibTeX data for An Independent Assessment of the Procedural Components of the Estonian Internet Voting System | Download (pdf) of An Independent Assessment of the Procedural Components of the Estonian Internet Voting System | Link to An Independent Assessment of the Procedural Components of the Estonian Internet Voting System
-
[15]
An Initial Usability Evaluation of the Secure Situation Awareness System
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith‚ Rachel Craddock and Glyn Jones
In The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012). IAS of ISCRAM. 2012.
Details about An Initial Usability Evaluation of the Secure Situation Awareness System | BibTeX data for An Initial Usability Evaluation of the Secure Situation Awareness System | Download (pdf) of An Initial Usability Evaluation of the Secure Situation Awareness System | Download (pdf) of An Initial Usability Evaluation of the Secure Situation Awareness System
-
[16]
Analytics for characterising and measuring the naturalness of online personae
Jason R.C. Nurse‚ Arnau Erola‚ Thomas Gibson−Robinson‚ Michael Goldsmith and Sadie Creese
In Security Informatics Journal. Vol. 5. No. 3. 2016.
Details about Analytics for characterising and measuring the naturalness of online personae | BibTeX data for Analytics for characterising and measuring the naturalness of online personae | Download (pdf) of Analytics for characterising and measuring the naturalness of online personae | DOI (10.1186/s13388-016-0028-1) | Link to Analytics for characterising and measuring the naturalness of online personae
-
[17]
Applying Social Network Analysis to Security
Elizabeth Phillips‚ Jason R. C. Nurse‚ Michael Goldsmith and Sadie Creese
In International Conference on Cyber Security for Sustainable Society. Pages 11–27. 2015.
Details about Applying Social Network Analysis to Security | BibTeX data for Applying Social Network Analysis to Security | Download (pdf) of Applying Social Network Analysis to Security
-
[18]
At the Crossroads: Cybersecurity and Psychology
Jason R.C. Nurse‚ Sadie Creese and Michael Goldsmith
In The 1st Annual Cyberpsychology Conference. 2013.
Details about At the Crossroads: Cybersecurity and Psychology | BibTeX data for At the Crossroads: Cybersecurity and Psychology | Link to At the Crossroads: Cybersecurity and Psychology
-
[19]
Attack Tree Analysis for Insider Threats on the IoT using Isabelle
Florian Kammüller‚ Jason R.C. Nurse and Christian W. Probst
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human−Computer Interaction (HCI). Pages 234−246. Springer. 2016.
Details about Attack Tree Analysis for Insider Threats on the IoT using Isabelle | BibTeX data for Attack Tree Analysis for Insider Threats on the IoT using Isabelle | DOI (10.1007/978-3-319-39381-0_21)
-
[20]
Attacker−Parametrised Attack Graphs
Alastair Janse van Rensburg‚ Jason R.C. Nurse and Michael Goldsmith
In 10th International Conference on Emerging Security Information‚ Systems and Technologies. Pages 316–319. 2016.
Details about Attacker−Parametrised Attack Graphs | BibTeX data for Attacker−Parametrised Attack Graphs | Download (pdf) of Attacker−Parametrised Attack Graphs
-
[21]
BOF4WSS: A Business−Oriented Framework for Enhancing Web Services Security for e−Business
Jason R.C. Nurse and Jane E. Sinclair
In 4th International Conference on Internet and Web Applications and Services (ICIW 2009). IEEE. 2009.
Details about BOF4WSS: A Business−Oriented Framework for Enhancing Web Services Security for e−Business | BibTeX data for BOF4WSS: A Business−Oriented Framework for Enhancing Web Services Security for e−Business | DOI (10.1109/ICIW.2009.48)
-
[22]
Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks
Cristian Iuga‚ Jason R.C. Nurse and Arnau Erola
In Journal of Human−centric Computing and Information Sciences. Vol. 6. No. 8. 2016.
Details about Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks | BibTeX data for Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks | DOI (10.1186/s13673-016-0065-2) | Link to Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks
-
[23]
Building Confidence in Information−Trustworthiness Metrics for Decision Support
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 12th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−13). IEEE. 2013.
Details about Building Confidence in Information−Trustworthiness Metrics for Decision Support | BibTeX data for Building Confidence in Information−Trustworthiness Metrics for Decision Support | Download of Building Confidence in Information−Trustworthiness Metrics for Decision Support | DOI (10.1109/TrustCom.2013.6)
-
[24]
Communicating Trustworthiness using Radar Graphs: A Detailed Look
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 11th International Conference on Privacy‚ Security and Trust (PST). IEEE. 2013.
Details about Communicating Trustworthiness using Radar Graphs: A Detailed Look | BibTeX data for Communicating Trustworthiness using Radar Graphs: A Detailed Look | Download (pdf) of Communicating Trustworthiness using Radar Graphs: A Detailed Look | DOI (10.1109/PST.2013.6596085)
-
[25]
Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
Maria Bada‚ Angela Sasse and Jason R. C. Nurse
In International Conference on Cyber Security for Sustainable Society. Pages 118–131. 2015.
Details about Cyber Security Awareness Campaigns: Why do they fail to change behaviour? | BibTeX data for Cyber Security Awareness Campaigns: Why do they fail to change behaviour? | Download (pdf) of Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
-
[26]
Determining the veracity of rumours on Twitter
Georgios Giasemidis‚ Colin Singleton‚ Ioannis Agrafiotis‚ Jason R.C. Nurse‚ Alan Pilgrim and Chris Willis
In 8th International Conference on Social Informatics (SocInfo 2016). Pages 185–205. Springer. 2016.
Details about Determining the veracity of rumours on Twitter | BibTeX data for Determining the veracity of rumours on Twitter | Download (pdf) of Determining the veracity of rumours on Twitter | DOI (10.1007/978-3-319-47880-7_12)
-
[27]
Effective Communication of Cyber Security Risks
Jason R.C. Nurse
In 7th International Scientific Conference on Security and Protection of Information (SPI 2013). 2013.
Details about Effective Communication of Cyber Security Risks | BibTeX data for Effective Communication of Cyber Security Risks | Link to Effective Communication of Cyber Security Risks
-
[28]
Evaluating the Compatibility of a Tool to Support E−Businesses' Security Negotiations
Jason R.C. Nurse and Jane E. Sinclair
In International Conference of Information Security and Internet Engineering‚ under World Congress on Engineering (WCE 2010). IEEE. 2010.
Details about Evaluating the Compatibility of a Tool to Support E−Businesses' Security Negotiations | BibTeX data for Evaluating the Compatibility of a Tool to Support E−Businesses' Security Negotiations | Download (pdf) of Evaluating the Compatibility of a Tool to Support E−Businesses' Security Negotiations
-
[29]
Experiences on Sharing E−Learning Resources using Service Technologies
Shanshan Yang‚ Mike S. Joy and Jason R.C. Nurse
In 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011). ACTA Press. 2011.
Details about Experiences on Sharing E−Learning Resources using Service Technologies | BibTeX data for Experiences on Sharing E−Learning Resources using Service Technologies | DOI (10.2316/P.2011.734-060)
-
[30]
Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems
Tina Wu and Jason R. C. Nurse
In Journal of Digital Forensics‚ Security and Law. Vol. 10. No. 4. Pages 79–96. December, 2015.
Details about Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems | BibTeX data for Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems | Download (pdf) of Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems | Link to Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems
-
[31]
Exploring a Controls−Based Assessment of Infrastructure Vulnerability
Oliver Farnan and Jason R. C. Nurse
In Risks and Security of Internet and Systems. Vol. 9572 of Lecture Notes in Computer Science. Pages 144−159. Springer. 2016.
Details about Exploring a Controls−Based Assessment of Infrastructure Vulnerability | BibTeX data for Exploring a Controls−Based Assessment of Infrastructure Vulnerability | Download (pdf) of Exploring a Controls−Based Assessment of Infrastructure Vulnerability | DOI (10.1007/978-3-319-31811-0_9)
-
[32]
Exploring the risks to identity security and privacy in cyberspace
Jason R.C. Nurse
In XRDS: Crossroads‚ The ACM Magazine for Students. Vol. 21. No. 3. Pages 42–47. 2015.
Details about Exploring the risks to identity security and privacy in cyberspace | BibTeX data for Exploring the risks to identity security and privacy in cyberspace | Download (pdf) of Exploring the risks to identity security and privacy in cyberspace | DOI (10.1145/2730912) | Link to Exploring the risks to identity security and privacy in cyberspace
-
[33]
Extracting Social Structure from DarkWeb Forums
Elizabeth Phillips‚ Jason R.C. Nurse‚ Michael Goldsmith and Sadie Creese
In 5th International Conference on Social Media Technologies‚ Communication‚ and Informatics (SOTICS '15). 2015.
Details about Extracting Social Structure from DarkWeb Forums | BibTeX data for Extracting Social Structure from DarkWeb Forums | Download (pdf) of Extracting Social Structure from DarkWeb Forums
-
[34]
Future scenarios and challenges for security and privacy
Meredydd Williams‚ Louise Axon‚ Jason R. C. Nurse and Sadie Creese
In 2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016). IEEE. 2016.
Details about Future scenarios and challenges for security and privacy | BibTeX data for Future scenarios and challenges for security and privacy | Download (pdf) of Future scenarios and challenges for security and privacy | DOI (10.1109/RTSI.2016.7740625) | Link to Future scenarios and challenges for security and privacy
-
[35]
Guidelines for Usable Cybersecurity: Past and Present
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011) at The 5th International Conference on Network and System Security (NSS 2011). IEEE. 2011.
Details about Guidelines for Usable Cybersecurity: Past and Present | BibTeX data for Guidelines for Usable Cybersecurity: Past and Present | Download (pdf) of Guidelines for Usable Cybersecurity: Past and Present | DOI (10.1109/CSS.2011.6058566)
-
[36]
Identifying Key−Players in Online Activist Groups on Facebook Social Network
Mariam Nouh and Jason R.C. Nurse
In IEEE 15th International Conference on Data Mining (ICDM) Workshop on Intelligence and Security Informatics. Pages 969–978. IEEE Computer Society. November, 2015.
Details about Identifying Key−Players in Online Activist Groups on Facebook Social Network | BibTeX data for Identifying Key−Players in Online Activist Groups on Facebook Social Network | Download (pdf) of Identifying Key−Players in Online Activist Groups on Facebook Social Network | DOI (10.1109/ICDMW.2015.88)
-
[37]
Identifying attack patterns for insider threat detection
Ioannis Agrafiotis‚ Jason R. C. Nurse‚ Oliver Buckley‚ Phil Legg‚ Sadie Creese and Michael Goldsmith
In Computer Fraud & Security. No. 7. Pages 9–17. July, 2015.
Details about Identifying attack patterns for insider threat detection | BibTeX data for Identifying attack patterns for insider threat detection | DOI (10.1016/S1361-3723(15)30066-X) | Link to Identifying attack patterns for insider threat detection
-
[38]
Identity attribution across CyberSpace and the Natural Space
D. Hodges‚ J.R.C. Nurse‚ M. Goldsmith and S. Creese
In The International Crime and Intelligence Analysis Conference. 2012.
Details about Identity attribution across CyberSpace and the Natural Space | BibTeX data for Identity attribution across CyberSpace and the Natural Space | Link to Identity attribution across CyberSpace and the Natural Space
-
[39]
If you can't understand it‚ you can't properly assess it! The reality of assessing security risks in Internet of Things systems
Jason R. C. Nurse‚ Petar Radanliev‚ Sadie Creese and David De Roure
In Living in the Internet of Things: Cybersecurity of the IoT Conference. IET. 2018.
To appear
Details about If you can't understand it‚ you can't properly assess it! The reality of assessing security risks in Internet of Things systems | BibTeX data for If you can't understand it‚ you can't properly assess it! The reality of assessing security risks in Internet of Things systems | Download (pdf) of If you can't understand it‚ you can't properly assess it! The reality of assessing security risks in Internet of Things systems
-
[40]
Inferring Social Relationships from Technology−Level Device Connections
Jason R. C. Nurse‚ Jess Pumphrey‚ Thomas Gibson−Robinson‚ Michael Goldsmith and Sadie Creese
In 12th International Conference on Privacy‚ Security and Trust (PST). Pages 40 − 47. IEEE. 2014.
Details about Inferring Social Relationships from Technology−Level Device Connections | BibTeX data for Inferring Social Relationships from Technology−Level Device Connections | Download (pdf) of Inferring Social Relationships from Technology−Level Device Connections | DOI (10.1109/PST.2014.6890922)
-
[41]
Information Quality and Trustworthiness: A Topical State−of−the−Art Review
Jason R.C. Nurse‚ Syed Sadiqur Rahman‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The International Conference on Computer Applications and Network Security (ICCANS) 2011. IEEE. 2011.
Details about Information Quality and Trustworthiness: A Topical State−of−the−Art Review | BibTeX data for Information Quality and Trustworthiness: A Topical State−of−the−Art Review | Download (pdf) of Information Quality and Trustworthiness: A Topical State−of−the−Art Review | Link to Information Quality and Trustworthiness: A Topical State−of−the−Art Review
-
[42]
Information trustworthiness as a solution to the misinformation problems in social media
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese‚ Koen Lamberts‚ Darren Price and Glyn Jones
In International Conference on Cyber Security for Sustainable Society. Pages 28−35. 2015.
Details about Information trustworthiness as a solution to the misinformation problems in social media | BibTeX data for Information trustworthiness as a solution to the misinformation problems in social media | Download (pdf) of Information trustworthiness as a solution to the misinformation problems in social media
-
[43]
Insider Threat Solutions − Moving from Concept to Reality
Jason R.C. Nurse and Elisa Bertino
In Journal of Wireless Mobile Networks‚ Ubiquitous Computing‚ and Dependable Applications. 2017.
Details about Insider Threat Solutions − Moving from Concept to Reality | BibTeX data for Insider Threat Solutions − Moving from Concept to Reality | DOI (10.22667/JOWUA.2017.03.31.001)
-
[44]
Insider threat response and recovery strategies in financial services firms
Jason R. C. Nurse Jacqueline Eggenschwiler Ioannis Agrafiotis
In Computer Fraud & Security. 2016.
Details about Insider threat response and recovery strategies in financial services firms | BibTeX data for Insider threat response and recovery strategies in financial services firms | Download (pdf) of Insider threat response and recovery strategies in financial services firms | DOI (10.1016/S1361-3723(16)30091-4)
-
[45]
Integration of Cyber Security Frameworks‚ Models and Approaches for Building Design Principles for the Internet−of−Things in Industry 4.0
Petar Radanliev‚ David De Roure‚ Jason R C Nurse‚ Razvan Nicolescu‚ Michael Huth‚ C Cannady and RM Montalvo
In Living in the Internet of Things: Cybersecurity of the IoT Conference. IET. 2018.
Details about Integration of Cyber Security Frameworks‚ Models and Approaches for Building Design Principles for the Internet−of−Things in Industry 4.0 | BibTeX data for Integration of Cyber Security Frameworks‚ Models and Approaches for Building Design Principles for the Internet−of−Things in Industry 4.0
-
[46]
Investigating the leakage of sensitive personal and organisational information in email headers
Jason R. C. Nurse‚ Arnau Erola‚ Michael Goldsmith and Sadie Creese
In Journal of Internet Services and Information Security. Vol. 5. No. 1. 2015.
Details about Investigating the leakage of sensitive personal and organisational information in email headers | BibTeX data for Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers
-
[47]
Managing the influence of social media using information trust
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese‚ Koen Lamberts‚ Darren Price and Glyn Jones
In Social Influence in the Information Age Conference. 2014.
Details about Managing the influence of social media using information trust | BibTeX data for Managing the influence of social media using information trust
-
[48]
Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms
Daniel Woods‚ Ioannis Agrafiotis‚ Jason RC Nurse and Sadie Creese
In Journal of Internet Services and Applications. 2017.
Details about Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms | BibTeX data for Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms | DOI (10.1186/s13174-017-0059-y)
-
[49]
Online banking malware ontology
Rodrigo Carvalho‚ Michael Goldsmith and Jason R. C. Nurse
In International Crime and Intelligence Analysis Conference (ICIA). 2015.
Details about Online banking malware ontology | BibTeX data for Online banking malware ontology | Download (pdf) of Online banking malware ontology
-
[50]
Optional data disclosure and the online privacy paradox: A UK perspective
Meredydd Williams and Jason R.C. Nurse
In Fourth International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human−Computer Interaction (HCI). Springer. Pages 186−197. Springer. 2016.
Details about Optional data disclosure and the online privacy paradox: A UK perspective | BibTeX data for Optional data disclosure and the online privacy paradox: A UK perspective | DOI (10.1007/978-3-319-39381-0_17)
-
[51]
Perspectives on privacy in the use of online systems
Meredydd Williams and Jason R. C. Nurse
In 30th British Human Computer Interaction Conference (B−HCI). BCS. 2016.
Details about Perspectives on privacy in the use of online systems | BibTeX data for Perspectives on privacy in the use of online systems | Download (pdf) of Perspectives on privacy in the use of online systems | Link to Perspectives on privacy in the use of online systems
-
[52]
Predicting Graphical Passwords
Matthieu Devlin‚ Jason R. C. Nurse‚ Duncan Hodges‚ Michael Goldsmith and Sadie Creese
In Theo Tryfonas and Ioannis Askoxylakis, editors, International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 17th International Conference on Human−Computer Interaction (HCI). Pages 23–35. Springer. 2015.
Details about Predicting Graphical Passwords | BibTeX data for Predicting Graphical Passwords | Download (pdf) of Predicting Graphical Passwords | DOI (10.1007/978-3-319-20376-8_3)
-
[53]
Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things
Meredydd Williams‚ Jason R.C. Nurse and Sadie Creese
In 15th International Conference on Privacy‚ Security and Trust (PST). IEEE. 2017.
(To appear)
Details about Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things | BibTeX data for Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things | Download (pdf) of Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things
-
[54]
Privacy salience: Taxonomies and research opportunities
Meredydd Williams‚ Jason R.C. Nurse and Sadie Creese
In Privacy and Identity Management – Facing Up To Next Steps‚ IFIP Advances in Information and Communication Technology. 2017.
Details about Privacy salience: Taxonomies and research opportunities | BibTeX data for Privacy salience: Taxonomies and research opportunities | DOI (10.1007/978-3-319-55783-0_18)
-
[55]
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
Oliver Buckley‚ Jason R. C. Nurse‚ Philip A. Legg‚ Michael Goldsmith and Sadie Creese
In Workshop on Socio−Technical Aspects in Security and Trust (STAST) associated with 27th IEEE Computer Security Foundations Symposium (CSF). IEEE. 2014.
Details about Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | BibTeX data for Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | Download (pdf) of Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | DOI (10.1109/STAST.2014.10)
-
[56]
Reflecting on the Use of Sonification for Network Monitoring
Louise Axon‚ Sadie Creese‚ Michael Goldsmith and Jason R.C. Nurse
In 10th International Conference on Emerging Security Information‚ Systems and Technologies. Pages 254–261. 2016.
Details about Reflecting on the Use of Sonification for Network Monitoring | BibTeX data for Reflecting on the Use of Sonification for Network Monitoring | Download (pdf) of Reflecting on the Use of Sonification for Network Monitoring
-
[57]
Securing e−Businesses that use Web Services − a Guided Tour Through BOF4WSS
Jason R.C. Nurse and Jane E. Sinclair
In International Journal on Advances in Internet Technology. Vol. 2. No. 4. 2009.
Details about Securing e−Businesses that use Web Services − a Guided Tour Through BOF4WSS | BibTeX data for Securing e−Businesses that use Web Services − a Guided Tour Through BOF4WSS | Download (pdf) of Securing e−Businesses that use Web Services − a Guided Tour Through BOF4WSS
-
[58]
Security risk assessment in Internet of Things systems
Jason R. C. Nurse; Sadie Creese; David De Roure
In IEEE IT Professional (IT Pro). Vol. 19. No. 5. Pages 20–26. 2017.
Details about Security risk assessment in Internet of Things systems | BibTeX data for Security risk assessment in Internet of Things systems | Download (pdf) of Security risk assessment in Internet of Things systems | DOI (10.1109/MITP.2017.3680959) | Link to Security risk assessment in Internet of Things systems
-
[59]
Smart Insiders: Exploring the Threat from Insiders using the Internet−of−Things
Jason R. C. Nurse‚ Arnau Erola‚ Ioannis Agrafiotis‚ Michael Goldsmith and Sadie Creese
In International Workshop on Secure Internet of Things at European Symposium on Research in Computer Security (ESORICS 2015). Pages 5–14. IEEE. 2015.
Details about Smart Insiders: Exploring the Threat from Insiders using the Internet−of−Things | BibTeX data for Smart Insiders: Exploring the Threat from Insiders using the Internet−of−Things | Download (pdf) of Smart Insiders: Exploring the Threat from Insiders using the Internet−of−Things | DOI (10.1109/SIOT.2015.10)
-
[60]
Sonification in Security Operations Centres: What do Security Practitioners Think?
Louise M. Axon‚ Bushra Alahmadi‚ Jason R. C. Nurse‚ Michael Goldsmith and Sadie Creese
In Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium. Internet Society. 2018.
To appear
Details about Sonification in Security Operations Centres: What do Security Practitioners Think? | BibTeX data for Sonification in Security Operations Centres: What do Security Practitioners Think? | Download (pdf) of Sonification in Security Operations Centres: What do Security Practitioners Think?
-
[61]
Supporting Human Decision−Making Online using Information Trustworthiness Metrics
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Syed S. Rahman
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 15th International Conference on Human−Computer Interaction (HCII). Springer. 2013.
Details about Supporting Human Decision−Making Online using Information Trustworthiness Metrics | BibTeX data for Supporting Human Decision−Making Online using Information Trustworthiness Metrics | Download (pdf) of Supporting Human Decision−Making Online using Information Trustworthiness Metrics | DOI (10.1007/978-3-642-39345-7_33)
-
[62]
Supporting the Comparison of Business−Level Security Requirements within Cross−Enterprise Service Development
Jason R.C. Nurse and Jane E. Sinclair
In Business Information Systems. Vol. 21 of Lecture Notes in Business Information Processing. Springer−Verlag. 2009.
Details about Supporting the Comparison of Business−Level Security Requirements within Cross−Enterprise Service Development | BibTeX data for Supporting the Comparison of Business−Level Security Requirements within Cross−Enterprise Service Development | DOI (10.1007/978-3-642-01190-0_6)
-
[63]
Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese and Koen Lamberts
In Journal of Trust Management. No. 2: 10. December, 2015.
Details about Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness | BibTeX data for Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness | Download (pdf) of Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness | DOI (10.1186/s40493-015-0021-5) | Link to Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness
-
[64]
Technology and information trust for supporting risky decisions based on social−media content
Jason R.C. Nurse‚ Michael Goldsmith‚ Sadie Creese and Koen Lamberts
In 15th IEEE International Conference on Computer and Information Technology (CIT−2015). Pages 461–468. 2015.
Details about Technology and information trust for supporting risky decisions based on social−media content | BibTeX data for Technology and information trust for supporting risky decisions based on social−media content | Download (pdf) of Technology and information trust for supporting risky decisions based on social−media content | DOI (10.1109/CIT/IUCC/DASC/PICOM.2015.66)
-
[65]
The Anatomy of Online Deception: What Makes Automated Text Convincing?
Richard Everett‚ Jason R.C. Nurse and Arnau Erola
In 31st ACM/SIGAPP Symposium on Applied Computing (SAC). ACM. 2016.
Details about The Anatomy of Online Deception: What Makes Automated Text Convincing? | BibTeX data for The Anatomy of Online Deception: What Makes Automated Text Convincing? | Download (pdf) of The Anatomy of Online Deception: What Makes Automated Text Convincing? | DOI (10.1145/2851613.2851813)
-
[66]
The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance
Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith‚ Jason R.C. Nurse and David Upton
No. RR−17−01. DCS. Oxford‚ UK. 2017.
Details about The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance | BibTeX data for The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance | Download (pdf) of The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance
-
[67]
The perfect storm: The privacy paradox and the Internet−of−Things
Meredydd Williams‚ Jason R.C. Nurse and Sadie Creese
In International Workshop on Challenges in Information Security and Privacy Management (ISPM)‚ associated with the 11th International Conference on Availability‚ Reliability and Security (ARES 2016). IEEE. 2016.
Details about The perfect storm: The privacy paradox and the Internet−of−Things | BibTeX data for The perfect storm: The privacy paradox and the Internet−of−Things | Download (pdf) of The perfect storm: The privacy paradox and the Internet−of−Things | DOI (10.1109/ARES.2016.25) | Link to The perfect storm: The privacy paradox and the Internet−of−Things
-
[68]
ToARist: An Augmented Reality Tourism App created through User−Centred Design
Meredydd Williams‚ Kelvin Yao and Jason R. C. Nurse
In 31st British Human Computer Interaction Conference (BHCI). BCS. 2017.
Details about ToARist: An Augmented Reality Tourism App created through User−Centred Design | BibTeX data for ToARist: An Augmented Reality Tourism App created through User−Centred Design | Download (pdf) of ToARist: An Augmented Reality Tourism App created through User−Centred Design | Download (pdf) of ToARist: An Augmented Reality Tourism App created through User−Centred Design
-
[69]
Tools for Understanding Identity
Sadie Creese‚ Thomas Gibson−Robinson‚ Michael Goldsmith‚ Duncan Hodges‚ Dee Kim‚ Oriana Love‚ Jason R. C. Nurse‚ Bill Pike and Jean Schultz
In IEEE Conference on Technologies for Homeland Security (HST '13). 2013.
Details about Tools for Understanding Identity | BibTeX data for Tools for Understanding Identity | DOI (10.1109/THS.2013.6699064)
-
[70]
Towards A Model to Support the Reconciliation of Security Actions across Enterprises
Jason R.C. Nurse and Jane E. Sinclair
In The 2nd Workshop on Socio−Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF). IEEE. 2012.
Details about Towards A Model to Support the Reconciliation of Security Actions across Enterprises | BibTeX data for Towards A Model to Support the Reconciliation of Security Actions across Enterprises | Download (pdf) of Towards A Model to Support the Reconciliation of Security Actions across Enterprises | DOI (10.1109/STAST.2012.11)
-
[71]
Towards Designing a Multipurpose Cybercrime Intelligence Framework
Mariam Nouh‚ Jason R.C. Nurse and Michael Goldsmith
In European Intelligence and Security Informatics Conference (EISIC). IEEE. 2016.
Details about Towards Designing a Multipurpose Cybercrime Intelligence Framework | BibTeX data for Towards Designing a Multipurpose Cybercrime Intelligence Framework | Download (pdf) of Towards Designing a Multipurpose Cybercrime Intelligence Framework | DOI (10.1109/EISIC.2016.018) | Link to Towards Designing a Multipurpose Cybercrime Intelligence Framework
-
[72]
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
Sadie Creese Philip A. Legg Nick Moffat Jason R.C. Nurse Jassim Happa Ioannis Agrafiotis Michael Goldsmith
In Journal of Wireless Mobile Networks‚ Ubiquitous Computing‚ and Dependable Applications. Vol. 4. No. 4. Pages 20−37. 2013.
Details about Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection | BibTeX data for Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection | Download (pdf) of Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
-
[73]
Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home
Jason R.C. Nurse‚ Ahmad Atamli and Andrew Martin
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human−Computer Interaction (HCI). Pages 255−267. Springer. 2016.
Details about Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home | BibTeX data for Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home | Download (pdf) of Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home | DOI (10.1007/978-3-319-39381-0_23)
-
[74]
Trustworthy and Effective Communication of Cybersecurity Risks: A Review
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 1st Workshop on Socio−Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). IEEE. 2011.
Details about Trustworthy and Effective Communication of Cybersecurity Risks: A Review | BibTeX data for Trustworthy and Effective Communication of Cybersecurity Risks: A Review | Download (pdf) of Trustworthy and Effective Communication of Cybersecurity Risks: A Review | DOI (10.1109/STAST.2011.6059257)
-
[75]
Two sides of the coin: measuring and communicating the trustworthiness of online information
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese and Koen Lamberts
In Journal of Trust Management. Vol. 1. No. 5. 2014.
Details about Two sides of the coin: measuring and communicating the trustworthiness of online information | BibTeX data for Two sides of the coin: measuring and communicating the trustworthiness of online information | DOI (10.1186/2196-064X-1-5) | Link to Two sides of the coin: measuring and communicating the trustworthiness of online information
-
[76]
Understanding Insider Threat: A Framework for Characterising Attacks
Jason R.C. Nurse‚ Oliver Buckley‚ Philip A. Legg‚ Michael Goldsmith‚ Sadie Creese‚ Gordon R.T. Wright and Monica Whitty
In Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society Security and Privacy Workshops (SPW14)‚ in conjunction with the IEEE Symposium on Security and Privacy (SP).. IEEE. 2014.
Details about Understanding Insider Threat: A Framework for Characterising Attacks | BibTeX data for Understanding Insider Threat: A Framework for Characterising Attacks | Download of Understanding Insider Threat: A Framework for Characterising Attacks | DOI (10.1109/SPW.2014.38) | Link to Understanding Insider Threat: A Framework for Characterising Attacks
-
[77]
Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks
Angeliki Aktypi‚ Jason R.C. Nurse and Michael Goldsmith
In Proceedings of the 2017 International Workshop on Multimedia Privacy and Security (MPS '17). ACM. October, 2017.
Details about Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks | BibTeX data for Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks | Download (pdf) of Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks | DOI (10.1145/3137616.3137617)
-
[78]
Using Information Trustworthiness Advice in Decision−Making
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 2nd Workshop on Socio−Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF). IEEE. 2012.
Details about Using Information Trustworthiness Advice in Decision−Making | BibTeX data for Using Information Trustworthiness Advice in Decision−Making | Download (pdf) of Using Information Trustworthiness Advice in Decision−Making | DOI (10.1109/STAST.2012.10)
-
[79]
Using Internet Activity Profiling for Insider−Threat Detection
Bushra A. Alahmadi‚ Philip .A. Legg and Jason R. C. Nurse
In 17th International Conference on Enterprise Information Systems (ICEIS). Pages 709–720. 2015.
Details about Using Internet Activity Profiling for Insider−Threat Detection | BibTeX data for Using Internet Activity Profiling for Insider−Threat Detection | Download (pdf) of Using Internet Activity Profiling for Insider−Threat Detection | DOI (10.5220/0005480407090720)
-
[80]
Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices
Chika Eze‚ Jason R.C. Nurse and Jassim Happa
In Journal of Wireless Mobile Networks‚ Ubiquitous Computing‚ and Dependable Applications (JoWUA). Vol. 7. No. 1. 2016.
Details about Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices | BibTeX data for Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices | Download (pdf) of Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices | Link to Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices